Title: fog computing by KRISHNA
1FUTURE INSTITUTE OF ENGINEERING MANAGEMENT
,KOLKATA
GROUP-03 PRESENTS FOG COMPUTING
- A NEW STAR IN
THE CLOUD UNIVERSE
2 GROUP-03KRISHNA KINKAR
JHAUJJAWAL KUMAR CHOUDHARYSHASHI KANT
KUMARARGHA SEN SHARMAGROUP-MENTORMr.
PRASHANT MAJUMDAR
3CONTENTS KRISHNA
- EXISTING SYSTEM(...)
- DISADVANTAGES
- CLOUD COMPUTING SECURITY THREATS.
- PROPOSED SYSTEM(FOG COMPUTING)
- CHARACTERISTICS
- USER BEHAVIOUR PROFILING
- DECOY SYSTEM
- SECURITY MEASURES
- APPLICATION OF FOG COMPUTING
- SECURITY AND PRIVACY IN FOG COMPUTING
- CONCLUSION
- FUTURE SCOPE.
4 5EXISTING SYSTEM CLOUD COMPUTING
- CLOUD COMPUTING IS A MODEL FOR ENABLING
- COVENIENT,ON DEMAND NETWORK ACCESS TO A
SHARED POOL OF CONFIGRABLE COMPUTING
RESOURCES THAT CAN BE RAPIDLY PROVISIONED AND
RELEASED WITH MINIMAL MANAGEMENT EFFORT.
6CLOUD COMPUTING UTILITY
7CLOUD MARKET
8WHY ADVANCEMENT NEEDED
- ENCRYPTION WAS FAILED IN SECURING THE DATA FROM
THE ATTACKER. - IT DOES NOT VERIFY WHETHER THE USER IS AUTHORISED
OR NOT. - NO BODY IS IDENTIFIED WHEN THE ATTACK HAPPENS.
- IT IS COMPLEX TO DETECT WHICH USER IS ATTACK.
- WE CANT DETECT WHICH FILE IS BEING HACKED.
- LATENCY TOO HIGH.
- RESILIENCY IMPRACTICAL.
9CLOUD COMPUTING SECURITY THREATS
- INSECURE APPLICATION PROGRAMMING INTERFACE.
- MALICIOUS INSIDERS.
- SHARED TECHNOLOGY VULNERABILITY.
- DATA LOSS/LEAKAGE.
- ACCOUNT,SERVICE TRAFFIC HIJACKING.
- UNKNOWN RISK PROFILE.
10PROPOSED SYSTEM UJJAWAL
(FOG COMPUTING)
- DATA PROCESSING AND APPLICATIONS ARE CONCENTRATED
IN DEVICES AT THE NETWORK EDGE RATHER THAN THE
CLOUD. - PROPOSED TO SECURE USERS DATA IN CLOUD USING-
- USER BEHAVIOUR PROFILING.
- DECOY INFORMATION TECHNOLOGY.
-
- IN THIS TECHNIQUE WHEN THE UNAUTHORISED PERSON
TRY TO ACCESS THE DATA, SYSTEM GENERATES THE FAKE
DOCUMENTS. - DEVICES COMMUNICATE PEER-TO-PEER TO EFFICIIENTLY
STORE/SHARE DATA AND TAKE LOCAL DECISIONS.
11(No Transcript)
12CHARACTERISTICS
- SECURITY
- - STRONG SECURITY (HARDWARE ROOT OF TRUST)
- - RESILIENCY/FAULT TOLERANCE.
- PROGRAMMABILITY
- - MULTIPLE APPLICATION SUPPORT.
- - VERSATILITY IN OPERATING ENVIRONMENT.
- REAL TIME FEATURES
- - DETERMINISTIC TIMING CAPABILITIES.
- SUPPORTS MULTIPLE OPERATING PLATFORMSUNIX,WINDOWS
,MAC etc. - EMPLOYS SIMPLE,FAST AND STANDARIZED IOT INTERNET
PROTOCOLS(TCP/IP ,SOCKETS etc.). - RUNS ON AFFORDABLE,OFF THE SHELF COMPUTING
TECHNOLOGIES.
13FOG COMPUTING SERVICE COVER
- APPLICATIONS THAT REQUIRE VERY LOW AND
PREDICTABLE LATENCY. - GEOGRAPHICALLY DISTRIBUTED APPLICATIONS.
- FAST MOBILE APLICATIONS.
- LARGE SCALE DISTRIBUTED CONTROL SYSTEMS.
- IMPROVES QUALITY OF SERVICE.
14ADVANTAGES OF FOG COMPUTING
- FOG AIMS TO PLACE THE DATA CLOSE TO THE END
USERS. - BIG DATA AND ANALYTICS CAN BE DONE FASTER WITH
BETTER RESULTS. - ADMINISTRATORS ARE ABLE TO SUPPORT LOCATION BASED
MOBILIY DEMANDS AND NOT HAVE TO TRAVERSE THE
ENTIRE NETWORK. - ENHANCE THE CLOUD EXPERIENCE BY ISOLATING USER
DATA THAT NEEDS TO LIVE ON THE EDGE .
15SECURING CLOUDS USING FOG
(USER BAHAVIOUR PROFILING)
- IT INCLUDES VOLUMETRIC INFORMATION,HOW MANY
INFORMATIONS ARE TYPICALLY READ AND HOW OFTEN. - NORMAL USER BEHAVIOR IS CONTINUOUSLY CHECKED
TO DETERMINE ABNORMAL ACCESS . - THIS SECURITY IS COMMONLY USED IN FRAUD DETECTION
APPLICATION.
16DECOY SYSTEM
- IN THIS SYSTEM BOGUS INFORMATION CAN BE GENERATED
ON DEMAND. - IT WILL CONFUSE AN ATTACKER.
- THIS TECHNOLOGY CAN BE INTEGRATED WITH USER
BAHAVIOR PROFILING TO SECURE A USERS DATA IN YHE
CLOUD.
17FOG COMPUTING ARCHITECTURE
18SECURITY MEASURES SHASHI KANT
- ANOMALY DETECTION
- COMPARED WITH THE PAST BEHAVIOUR OF USER.IF
THE USER BEHAVIOUR IS EXCEEDING A LIMIT THEN THE
REMOTE USER IS SUSPECTED TO BE ANOMALY. - CHALLENGE REQUEST
- SUSPECTED USER IS ASKED FOR RANDOMLY
SELECTED SECRET QUESTIONS.
19(No Transcript)
20(No Transcript)
21(No Transcript)
22APPLICATION OF FOG COMPUTING
- SOFTWARE DEFINED NETWORKS(SDN)
- SDN CONCEPT TOGETHER WITH FOG WILL RESOLVE
THE ISSUE IN VEHICULAR NETWORKS , INTERMITTENT
CONNECTIVITY , COLLISION AND HIGH PACKET LOSS
RATE. - IoT AND CYBER-PHYSICAL SYSTEMS(CPSs)
- INTEGRATE THE ABSTRACTIONS AND PRECISION OF
SOFTWARE AND NETWORKING WITH THE DYNAMICS IN THE
PHYSICAL ENVIRONMENT. - DECENTRALIZED SMART BUILDING CONTROL
- WITH FOG COMPUTING ,SMART BUILDING CAN MAINTAIN
THEIR FABRIC,EXTERNAL AND INTERNAL ENVIRONMENTS.
23(No Transcript)
24SECURITY PRIVACY IN
FOG COMPUTING
- AUTHENTICATION AT DIFFERENT LEVELS OF GATEWAYS.
- SMART METERS INSTALLED IN THE CONSUMERS HOME.
- PUBLIC KEY INFRASTRUCTURE(PKI) WHICH INVOLVE
MULTICAST AUTHENTICATION. - INTRUSIONS CAN BE DETECTED USING SIGNATURE BASED
METHOD. - INTRUSION CAN ALSO BE CAPTURED BY USING AN
ANOMALY-BASED METHOD.
25CONCLUSION
- FOG COMPUTING IS NOT A REPLACEMENT OF CLOUD.
- IT JUST EXTENDS THE CLOUD COMPUTING BY PROVIDING
SECURITY IN THE CLOUD ENVIRONMENT. - IT IS A NEW APPROACH FOR SECURING DATA IN THE
CLOUD BY USING OFFENSIVE DECOY TECHNOLOGY. - IT MONITORS DATA ACCESS IN THE CLOUD AND DETECTS
ABNORMAL DATA ACCESS PATTERNS. - BY USING FOG TECHNOLOGY CAN MINIMIZE INSIDER
ATTACKS IN CLOUD
26FUTURE SCOPE
- APPLICABLE ONLY FOR SINGLE CLOUD OWNERSHIP
SYSTEM. - FOG APPLICATION CAN BE ENHANCEDTO MANAGE A CLOUD
ENVIRONMENT WHICH HAS MORE THAN ONE CLOUD
ARCHITECTURE.
27(No Transcript)
28(No Transcript)